Описание
The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.
It was discovered that httpd used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat JBoss Enterprise Application Platform 6 | httpd22 | Affected | ||
Red Hat JBoss Enterprise Application Platform 7 | httpd | Not affected | ||
Red Hat JBoss Enterprise Web Server 1 | httpd | Will not fix | ||
JBoss Core Services on RHEL 6 | jbcs-httpd24-httpd | Fixed | RHSA-2016:1851 | 12.09.2016 |
JBoss Core Services on RHEL 7 | jbcs-httpd24-httpd | Fixed | RHSA-2016:1851 | 12.09.2016 |
Red Hat Enterprise Linux 5 | httpd | Fixed | RHSA-2016:1421 | 18.07.2016 |
Red Hat Enterprise Linux 6 | httpd | Fixed | RHSA-2016:1421 | 18.07.2016 |
Red Hat Enterprise Linux 7 | httpd | Fixed | RHSA-2016:1422 | 18.07.2016 |
Red Hat JBoss Enterprise Web Server 2 for RHEL 6 | httpd | Fixed | RHSA-2016:1649 | 22.08.2016 |
Red Hat JBoss Enterprise Web Server 2 for RHEL 6 | jbcs-httpd24 | Fixed | RHSA-2016:1649 | 22.08.2016 |
Показывать по
Дополнительная информация
Статус:
EPSS
5 Medium
CVSS3
5 Medium
CVSS2
Связанные уязвимости
The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.
The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.
The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 ...
EPSS
5 Medium
CVSS3
5 Medium
CVSS2